A number of recent events has shown just how important it is for developers to guard against rogue SDKs in their mobile apps. In this article Alan Bavosa discusses the ways in which rogue SDKs can affect an app and the steps developers can take to protect their apps against them.
Your phone may soon be all you will ever need to carry around. Up until now, your online identity and the real world hasn't mixed. We have ways of authenticating offline and different methods online. Enole is trying to fix that, with an uncomplicated RESTful web service that enables developers to store user details alongside a mobile device ID.
There are three standard ways to manage API authentication these days: API keys, OAuth tokens and JSON Web tokens (JWT). Adam Duvander over at the Zapier engineering blog explains how and when to use them. The humble API key is the common and earliest form of API authentication.